International Journal of Advanced Information in Arts, Science & Management Vol.2, No.2, December 2014
|
|
- Ross Doyle
- 8 years ago
- Views:
Transcription
1 Efficient Attendance Management System Using Face Detection and Recognition Arun.A.V, Bhatath.S, Chethan.N, Manmohan.C.M, Hamsaveni M Department of Computer Science and Engineering, Vidya Vardhaka College of Engineering Mysore, Karnataka, India Abstract: Students attendance in the classroom is very important task and if taken manually wastes a lot of time. There are many automatic methods available for this purpose i.e. biometric attendance. All These methods also waste time because students have to make a queue to touch their thumb on the scanning device. This work describes the efficient algorithm that automatically marks the attendance without human intervention. This attendance is recorded by using a camera attached in front of classroom that is continuously capturing images of students, detect the faces in images and compare the detected faces with the database and mark the attendance. We propose using real time face detection algorithms integrated on an existing Learning Management System (LMS), which automatically detects and registers students attending the lecture. The system represents a supplemental tool for instructors, to track facial changes during a longer period of time. This new system aims to be less time consuming than traditional methods, at the same time being non intrusive and not interfere with the regular teaching process. The tool promises to offer accurate results and a more detailed reporting system which shows student attendance in a classroom. Keywords: Automatic Attendance, Face Detection, Face Recognition, Image Enhancement, Enrollment, Verification. I. Introduction Maintaining the attendance is very important in all the institutes for checking the performance of students. Every institute has its own method in this regard. Some are taking attendance manually using attendance registers, marking attendance sheets or file based approach and some have adopted methods of automatic attendance using some biometric techniques. But in these methods students have to wait for long time in making a queue at time they enter the classroom. Many biometric systems are available but the key authentications are same is all the techniques. Every biometric system consists of enrolment process in which unique features of a person is stored in the database and then there are processes of identification and verification. These two processes compare the biometric feature of a person with previously stored template captured at the time of enrollment. Biometric templates can be of many types like Fingerprints, Eye Iris, Face, Hand Geometry, Signature, Gait and voice. Our system uses the face recognition approach for the automatic attendance of students in the classroom environment without students intervention. Face recognition consists of two steps, in first step faces are detected in the image and then these detected faces are compared with the database for verification. The efficiency of face recognition algorithm can be increased with the fast face detection algorithm. Face recognition techniques can be divided into two types, Appearance based which use texture features that is applied to whole face or some specific regions, other is Feature based which uses geometric features like mouth, nose, eyes, eye brows, cheeks and relation between them. Illumination invariant algorithm is utilized for removing the lighting effect inside the classroom. Organization: The paper is organized as follows: in Section I we present System Modules, in Section II we present a System Description, in Section III we describe System Algorithms, and in section IV we conclude our paper. I. System modules: 1) STUDENT ENROLLEMENT 2) FACE DETECTION 3) FACE RECOGNITION 4) ATTENDANCE MANADEMENT II. STUDENT ENROLLEMENT In this module we are going to maintain person details in the database which include information like Branch, SEM, Name, USN etc. and we also store the image of a many persons in the database for further process. These unique features are then stored in the face database with certain id of that person. At the time of enrollment templates of face images of individual students are stored in the 7
2 Face database. This will help us to give the details of a person when his face is detected and recognized in given group image. In case person face in the group image is not stored in the databases then it will gives an error message like "this person details is not stored in the database". Face detection: Detecting a face is in essence an object detection task, where the object of interest in this case is the face. However, many factors can interfere with the face detection algorithms, factors such as face pose, scale, position, rotation, light, image colors etc. The same problems arise when one wants to identify (recognize) a face. There are plenty face detection algorithms which can effectively detect a face (or any other specific object) in a picture. In the system presented here, most students face the camera frontally hence we chose to use the HAAR classifier for face detection. The classifier works by training a model using positive face images and negative face images. A positive image is an image that contains the desired object to be detected, in our case this object is a face. A negative image is an image that does not contain the desired object. Problem faced during this process was the large number of falsepositives: objects mistakenly detected as faces. This was not such a big issue for us, since a false-positive does not result in a positive identification during the recognition phase. Because of this, we lowered the detection threshold, so all faces could be detected. After a face has been detected, the rectangle enclosing this face is cropped and processed later by the face recognition module. This rectangle represents a single face, and after being cropped as an image is transferred on server. Each file transferred is renamed to have a unique ID. Face recognition: Face detection is defined as the process of extracting faces from scenes. So the system positively identifies a certain image region as a face. This procedure has many applications like face tracking, pose estimation or compression. The next step -feature extraction- involves obtaining relevant facial features from the data. These features could be certain face regions, variations, angles or measures, which can be human relevant (e.g. eyes spacing) or not. This phase has other applications like facial feature tracking or emotion recognition. Finally, the system does recognize the face. In an identification task, the system would report an identity from a database. This phase involves a comparison method, a classification algorithm and an accuracy measure. Recognizing a face means to identify that particular face from a list of faces on a database. Whenever we successfully identify a face, a copy of that face is stored in the database of faces for that student. This way even if a student gradually changes his appearance (e.g., grows a beard) the system is still capable to identify him, since it has multiple images of the same person. On each consequent scan for a student, the recognition module starts comparing images from this database, sorted by date in descending order. This approach was chosen since the latest image of a student on our database is most likely to be more similar to the current captured image. Of course, a drastic change on a student s look causes the system to not identify that particular student. To solve this issue, we have included a module, which lists all unidentified faces and the teacher is able to manually connect a captured face with a student from the list. This image is also stored on our database, as an updated picture of this particular student. This manual recognition process is performed only once. In a subsequent scan, this student is identified automatically by our system. To speed up the face recognition process we only compare images captured in a classroom, with the database of students enrolled for that course only. This ensures that we process only a small subset of images available on our server. Attendance management: This module can be used to view the attendance status of the student. After the face detection and recognition method attendance is marked on the server. This system uses a protocol for attendance. A time table module is also attached with the system which automatically gets the subject, class, date and time. Teachers come in the class and just press a button to start the attendance process and the system automatically gets the attendance without even the intensions of students and teacher. In this way a lot of time is saved and this is highly securing process no one can mark the attendance of other. Attendance is maintained on the server so anyone can access it for 8
3 it purposes like administration, parents and students themselves. III. System description: The system consists of a camera that captures the images of the classroom and sends it to the image enhancement module. After enhancement the image comes in the Face Detection and Recognition modules and then the attendance is marked on the database server. At the time of enrollment templates of face images of individual students are stored in with the face database. If any face is recognized the attendance is marked on the server from where anyone can access and use it for different purposes. This system uses a protocol for attendance. Camera takes the images continuously to detect and recognize all the students in the classroom. In order to avoid the false detection we are using the skin classification technique. This section describes the software algorithm for the system. The algorithm consists of the following steps o Image acquisition o Upgrade Contrast o Skin classification o Connected Region Analysis o Face detection o Face recognition o Attendance Data Flow Diagram Image Acquisition: Image is acquired from a high definition camera that is connected above the white board. This camera is connected to the computer. It captures images after every 2 minutes and sends these images to the computer for processing. Experimental Setup Using this technique enhance the efficiency and accuracy of the detection process. In this process first the skin is classified and then only skin pixels remains and all other pixels in the image are set to black, this greatly enhance the accuracy of face detection process. Two databases are displayed in the experimental setup. Face Database is the collection of face images and extracted features at the time of enrollment process and the second attendance database contains the information about the teachers and students and also use to mark attendance. IV. System Algorithm Upgrade Contrast: Input image In this stage we convert RGB image into binary image. For this process, we calculate the average value of RGB for each pixel and if the average value is below than 110, we replace it by black pixel and 9
4 otherwise we replace it by white pixel. By this method, we get a binary image from RGB image. Histogram normalization is good technique for contrast enhancement in the spatial domain. Face Detection After the detection of faces from the images next step is cropping of each detected face. The algorithm uses the technique of threading to enhance the speed of algorithm. Each cropped image is assigned to a separate thread for the recognition purposes. Histogram Equalized Image This can be easily seen that the students sitting on the back rows are now clearly seen and in this way they can be easily recognized. Noise Filtering: Many sources of noise may exist in the input image when captured from the camera. There are many techniques for noise removal. In our system median filtering in is used for the purpose of noise removal in the histogram normalized image. Skin classification: This is used to increase the efficiency of the face detection Algorithm. As can be shown in the above Figure pixel those are closely related to the skin becomes white and all other are black. This binary image uses the threshold of skin colors. Connected Region Analysis: The image output by morphological processing still contains quite a few non-face regions. Most of these are hands, arms, regions of dress that match skin color and some portions of background. In connected region analysis, image statistics from the training set are used to classify each connected region in the image. Face Detection: In this section faces are detected by marking circles on the faces of students. Haar classifiers have been used for detection. Initially face detection algorithm was tested on variety of images with different face positions and lighting conditions and then algorithm was applied to detect faces in real time video. Cropped Faces Face Recognition and Attendance: After the face detection step the next is face recognition. This can be achieved by cropping the first detected face from the image and compare it with the database. This is called the selection of region of interest. In this way faces of students are verified one by one with the face database using the Eigen Face method and attendance is marked on the server. Face Recognition techniques are used in our system. The faces which are recognized will be marked as present and the other faces which are remaining will be marked as absent. SMS option will be provided so that is student present or absent status will be sent. And Export to EXCEL sheet is provided to take the print out of attendance status. VII. Conclusion This paper introduces the efficient and accurate method of attendance in the classroom environment that can replace the old manual methods. This method is secure enough, reliable and available for use. No need for specialized hardware for installing the system in the classroom. It can be constructed using a camera and computer. There is a need to use some algorithms that can recognize the faces in veil to improve the system performance. 10
5 REFERENCES: 1. Y. Li, S. Gong, and H. Liddell. Support vector regression and classification based multi-view face detection and recognition. In IEEE International Conference on Automatic Face and Gesture Recognition, March ] M. Turk and A. Pentland (1991). "Face recognition using eigenfaces". Proc. IEEE Conference on Computer Vision and Pattern Recognition. 3. Tabassam nawaz, Saim Pervaiz, Arash Korrani, Azhar-ud-din, Development of Academic Attendence Monitoring SystemUsing Fingerprint Identification, IJCSNS InternationalJournal of Computer Science and Network Security, VOL.9No.5, May Alexander Kuranov, Rainer Lienhart, and Vadim Pisarevsky. An Empirical Analysis of Boosting Algorithms for Rapid Objects With an Extended Set of Haar-like Features. Intel Technical Report MRL-TR-July02-01; Phillip Ian Wilson, John Fernandez, Facial Feature Detection Using Haar Classifiers. Journal of Computing Sciences in Colleges; Yohei Kawaguchi, Tetsuo Shoji, Weijane Lin, Koh Kakusho, Michihiko Minoh. Face Recognition-based Lecture Attendance System. 7. W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld, Face recognition: A literature survey, ACM Computing Surveys, 2003, vol. 35, no. 4, pp
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems
Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary
More informationFACE RECOGNITION BASED ATTENDANCE MARKING SYSTEM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationEfficient Attendance Management: A Face Recognition Approach
Efficient Attendance Management: A Face Recognition Approach Badal J. Deshmukh, Sudhir M. Kharad Abstract Taking student attendance in a classroom has always been a tedious task faultfinders. It is completely
More informationDevelopment of Academic Attendence Monitoring System Using Fingerprint Identification
164 Development of Academic Attendence Monitoring System Using Fingerprint Identification TABASSAM NAWAZ, SAIM PERVAIZ, ARASH KORRANI, AZHAR-UD-DIN Software Engineering Department Faculty of Telecommunication
More informationLOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. indhubatchvsa@gmail.com
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
More informationAUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM
Journal of Engineering Science and Technology EURECA 2014 Special Issue January (2015) 45-59 School of Engineering, Taylor s University AUTOMATED ATTENDANCE CAPTURE AND TRACKING SYSTEM EU TSUN CHIN*, WEI
More informationIndex Terms: Face Recognition, Face Detection, Monitoring, Attendance System, and System Access Control.
Modern Technique Of Lecture Attendance Using Face Recognition. Shreya Nallawar, Neha Giri, Neeraj Deshbhratar, Shamal Sane, Trupti Gautre, Avinash Bansod Bapurao Deshmukh College Of Engineering, Sewagram,
More informationHANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 HANDS-FREE PC CONTROL CONTROLLING OF MOUSE CURSOR USING EYE MOVEMENT Akhil Gupta, Akash Rathi, Dr. Y. Radhika
More informationMathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
More informationAN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION
AN IMPROVED DOUBLE CODING LOCAL BINARY PATTERN ALGORITHM FOR FACE RECOGNITION Saurabh Asija 1, Rakesh Singh 2 1 Research Scholar (Computer Engineering Department), Punjabi University, Patiala. 2 Asst.
More informationMultimodal Biometric Recognition Security System
Multimodal Biometric Recognition Security System Anju.M.I, G.Sheeba, G.Sivakami, Monica.J, Savithri.M Department of ECE, New Prince Shri Bhavani College of Engg. & Tech., Chennai, India ABSTRACT: Security
More informationFace detection is a process of localizing and extracting the face region from the
Chapter 4 FACE NORMALIZATION 4.1 INTRODUCTION Face detection is a process of localizing and extracting the face region from the background. The detected face varies in rotation, brightness, size, etc.
More informationFace Recognition in Low-resolution Images by Using Local Zernike Moments
Proceedings of the International Conference on Machine Vision and Machine Learning Prague, Czech Republic, August14-15, 014 Paper No. 15 Face Recognition in Low-resolution Images by Using Local Zernie
More informationIMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS
IMPLEMENTATION OF CLASSROOM ATTENDANCE SYSTEM BASED ON FACE RECOGNITION IN CLASS Ajinkya Patil 1, Mrudang Shukla 2 1 Mtech (E&TC), 2 Assisstant Professor Symbiosis institute of Technology, Pune, Maharashtra,
More informationAdaptive Face Recognition System from Myanmar NRC Card
Adaptive Face Recognition System from Myanmar NRC Card Ei Phyo Wai University of Computer Studies, Yangon, Myanmar Myint Myint Sein University of Computer Studies, Yangon, Myanmar ABSTRACT Biometrics is
More informationFPGA Implementation of Human Behavior Analysis Using Facial Image
RESEARCH ARTICLE OPEN ACCESS FPGA Implementation of Human Behavior Analysis Using Facial Image A.J Ezhil, K. Adalarasu Department of Electronics & Communication Engineering PSNA College of Engineering
More informationA secure face tracking system
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 10 (2014), pp. 959-964 International Research Publications House http://www. irphouse.com A secure face tracking
More informationFace Recognition Using Multi-Agent System
International Journal of Computer Science and Engineering Open Access Review Paper Volume-4, Issue-4 E-ISSN: 2347-2693 Face Recognition Using Multi-Agent System Wasim Shaikh 1*, Hemant Shinde 2 and Grishma
More informationThe Implementation of Face Security for Authentication Implemented on Mobile Phone
The Implementation of Face Security for Authentication Implemented on Mobile Phone Emir Kremić *, Abdulhamit Subaşi * * Faculty of Engineering and Information Technology, International Burch University,
More informationBiometric Authentication using Online Signature
University of Trento Department of Mathematics Outline Introduction An example of authentication scheme Performance analysis and possible improvements Outline Introduction An example of authentication
More informationAutomated Attendance Management System using Face Recognition
Automated Attendance Management System using Face Recognition Mrunmayee Shirodkar Varun Sinha Urvi Jain Bhushan Nemade Student, Thakur College Of Student, Thakur College Of Student, Thakur College of Assistant
More informationAnalecta Vol. 8, No. 2 ISSN 2064-7964
EXPERIMENTAL APPLICATIONS OF ARTIFICIAL NEURAL NETWORKS IN ENGINEERING PROCESSING SYSTEM S. Dadvandipour Institute of Information Engineering, University of Miskolc, Egyetemváros, 3515, Miskolc, Hungary,
More informationApplication of Face Recognition to Person Matching in Trains
Application of Face Recognition to Person Matching in Trains May 2008 Objective Matching of person Context : in trains Using face recognition and face detection algorithms With a video-surveillance camera
More informationTemplate-based Eye and Mouth Detection for 3D Video Conferencing
Template-based Eye and Mouth Detection for 3D Video Conferencing Jürgen Rurainsky and Peter Eisert Fraunhofer Institute for Telecommunications - Heinrich-Hertz-Institute, Image Processing Department, Einsteinufer
More informationOrganization Attendance Record System: Frauds and A Proposed Facial Recognition Technique
Organization Attendance Record System: Frauds and A Proposed Facial Recognition Technique Morufu Olalere * Cyber Security Science Dept. Ojeniyi J. Adebayo Cyber Security Science Dept. Femi Osho Cyber Security
More informationKeywords image processing, signature verification, false acceptance rate, false rejection rate, forgeries, feature vectors, support vector machines.
International Journal of Computer Application and Engineering Technology Volume 3-Issue2, Apr 2014.Pp. 188-192 www.ijcaet.net OFFLINE SIGNATURE VERIFICATION SYSTEM -A REVIEW Pooja Department of Computer
More informationENHANCING ATM SECURITY USING FINGERPRINT AND GSM TECHNOLOGY
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationECE 533 Project Report Ashish Dhawan Aditi R. Ganesan
Handwritten Signature Verification ECE 533 Project Report by Ashish Dhawan Aditi R. Ganesan Contents 1. Abstract 3. 2. Introduction 4. 3. Approach 6. 4. Pre-processing 8. 5. Feature Extraction 9. 6. Verification
More informationHaar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance
Haar Features Based Face Detection and Recognition for Advanced Classroom and Corporate Attendance Tiwari Priti Anilkumar 1, Kalyani Jha 2, Karishma P Uchil 3, Naveen H 4 U.G. Student, Dept. of ECE, M
More informationClassroom Monitoring System by Wired Webcams and Attendance Management System
Classroom Monitoring System by Wired Webcams and Attendance Management System Sneha Suhas More, Amani Jamiyan Madki, Priya Ranjit Bade, Upasna Suresh Ahuja, Suhas M. Patil Student, Dept. of Computer, KJCOEMR,
More informationAn Active Head Tracking System for Distance Education and Videoconferencing Applications
An Active Head Tracking System for Distance Education and Videoconferencing Applications Sami Huttunen and Janne Heikkilä Machine Vision Group Infotech Oulu and Department of Electrical and Information
More informationFace Recognition For Remote Database Backup System
Face Recognition For Remote Database Backup System Aniza Mohamed Din, Faudziah Ahmad, Mohamad Farhan Mohamad Mohsin, Ku Ruhana Ku-Mahamud, Mustafa Mufawak Theab 2 Graduate Department of Computer Science,UUM
More informationSpeed Performance Improvement of Vehicle Blob Tracking System
Speed Performance Improvement of Vehicle Blob Tracking System Sung Chun Lee and Ram Nevatia University of Southern California, Los Angeles, CA 90089, USA sungchun@usc.edu, nevatia@usc.edu Abstract. A speed
More informationMay 2010. For other information please contact:
access control biometrics user guide May 2010 For other information please contact: British Security Industry Association t: 0845 389 3889 f: 0845 389 0761 e: info@bsia.co.uk www.bsia.co.uk Form No. 181.
More informationSIGNATURE VERIFICATION
SIGNATURE VERIFICATION Dr. H.B.Kekre, Dr. Dhirendra Mishra, Ms. Shilpa Buddhadev, Ms. Bhagyashree Mall, Mr. Gaurav Jangid, Ms. Nikita Lakhotia Computer engineering Department, MPSTME, NMIMS University
More informationEuler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, murthyg@isical.ac.in Indian Statistical Institute,
More informationReal Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control
Vol. 3, Issue. 5, Sep - Oct. 2013 pp-3129-3133 ISSN: 2249-6645 Real Time Vision Hand Gesture Recognition Based Media Control via LAN & Wireless Hardware Control Tarachand Saini,Savita Sivani Dept. of Software
More informationA Foolproof Biometric Attendance Management System
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 433-438 International Research Publications House http://www. irphouse.com /ijict.htm A Foolproof
More informationDigital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government
Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government Briefing W. Frisch 1 Outline Digital Identity Management Identity Theft Management
More informationDe-duplication The Complexity in the Unique ID context
De-duplication The Complexity in the Unique ID context 1. Introduction Citizens in India depend on the Government for various services at various stages of the human lifecycle. These services include issuance
More informationDESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD
DESIGN OF DIGITAL SIGNATURE VERIFICATION ALGORITHM USING RELATIVE SLOPE METHOD P.N.Ganorkar 1, Kalyani Pendke 2 1 Mtech, 4 th Sem, Rajiv Gandhi College of Engineering and Research, R.T.M.N.U Nagpur (Maharashtra),
More informationUnderstanding The Face Image Format Standards
Understanding The Face Image Format Standards Paul Griffin, Ph.D. Chief Technology Officer Identix April 2005 Topics The Face Image Standard The Record Format Frontal Face Images Face Images and Compression
More informationKeywords: fingerprints, attendance, enrollment, authentication, identification
Volume 4, Issue 11, November 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com 94 POS Terminal
More informationBuilding an Advanced Invariant Real-Time Human Tracking System
UDC 004.41 Building an Advanced Invariant Real-Time Human Tracking System Fayez Idris 1, Mazen Abu_Zaher 2, Rashad J. Rasras 3, and Ibrahiem M. M. El Emary 4 1 School of Informatics and Computing, German-Jordanian
More informationIntelligent Face Recognition
International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-2 E-ISSN: 2347-2693 Intelligent Face Recognition Akram Qureshi 1* and Ashok Kajla 2 1*,2 RTU Kota
More informationHAND GESTURE BASEDOPERATINGSYSTEM CONTROL
HAND GESTURE BASEDOPERATINGSYSTEM CONTROL Garkal Bramhraj 1, palve Atul 2, Ghule Supriya 3, Misal sonali 4 1 Garkal Bramhraj mahadeo, 2 Palve Atule Vasant, 3 Ghule Supriya Shivram, 4 Misal Sonali Babasaheb,
More informationVideo Surveillance System for Security Applications
Video Surveillance System for Security Applications Vidya A.S. Department of CSE National Institute of Technology Calicut, Kerala, India V. K. Govindan Department of CSE National Institute of Technology
More informationA Various Biometric application for authentication and identification
A Various Biometric application for authentication and identification 1 Karuna Soni, 2 Umesh Kumar, 3 Priya Dosodia, Government Mahila Engineering College, Ajmer, India Abstract: In today s environment,
More informationImplementation of OCR Based on Template Matching and Integrating it in Android Application
International Journal of Computer Sciences and EngineeringOpen Access Technical Paper Volume-04, Issue-02 E-ISSN: 2347-2693 Implementation of OCR Based on Template Matching and Integrating it in Android
More informationSignature Region of Interest using Auto cropping
ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 1 Signature Region of Interest using Auto cropping Bassam Al-Mahadeen 1, Mokhled S. AlTarawneh 2 and Islam H. AlTarawneh 2 1 Math. And Computer Department,
More informationCircle Object Recognition Based on Monocular Vision for Home Security Robot
Journal of Applied Science and Engineering, Vol. 16, No. 3, pp. 261 268 (2013) DOI: 10.6180/jase.2013.16.3.05 Circle Object Recognition Based on Monocular Vision for Home Security Robot Shih-An Li, Ching-Chang
More informationAutomatic Biometric Student Attendance System: A Case Study Christian Service University College
Automatic Biometric Student Attendance System: A Case Study Christian Service University College Dr Thomas Yeboah Dr Ing Edward Opoku-Mensah Mr Christopher Ayaaba Abilimi ABSTRACT In many tertiary institutions
More informationLow-resolution Image Processing based on FPGA
Abstract Research Journal of Recent Sciences ISSN 2277-2502. Low-resolution Image Processing based on FPGA Mahshid Aghania Kiau, Islamic Azad university of Karaj, IRAN Available online at: www.isca.in,
More informationA Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
More informationFace Recognition: Some Challenges in Forensics. Anil K. Jain, Brendan Klare, and Unsang Park
Face Recognition: Some Challenges in Forensics Anil K. Jain, Brendan Klare, and Unsang Park Forensic Identification Apply A l science i tto analyze data for identification Traditionally: Latent FP, DNA,
More informationUSING COMPUTER VISION IN SECURITY APPLICATIONS
USING COMPUTER VISION IN SECURITY APPLICATIONS Peter Peer, Borut Batagelj, Franc Solina University of Ljubljana, Faculty of Computer and Information Science Computer Vision Laboratory Tržaška 25, 1001
More informationA Dynamic Approach to Extract Texts and Captions from Videos
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationInteractive person re-identification in TV series
Interactive person re-identification in TV series Mika Fischer Hazım Kemal Ekenel Rainer Stiefelhagen CV:HCI lab, Karlsruhe Institute of Technology Adenauerring 2, 76131 Karlsruhe, Germany E-mail: {mika.fischer,ekenel,rainer.stiefelhagen}@kit.edu
More informationInternational Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 331 ISSN 2278-7763
International Journal of Advancements in Research & Technology, Volume 2, Issue 5, M ay-2013 331 An Integrated Real-Time Vision Based Home Security System Qusay Idrees Sarhan Department of Computer Sciences,
More informationA PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA
A PHOTOGRAMMETRIC APPRAOCH FOR AUTOMATIC TRAFFIC ASSESSMENT USING CONVENTIONAL CCTV CAMERA N. Zarrinpanjeh a, F. Dadrassjavan b, H. Fattahi c * a Islamic Azad University of Qazvin - nzarrin@qiau.ac.ir
More informationFace Recognition Using Robotics
International Journal of Computer Sciences and Engineering Open Access Technical Paper Volume-4, Issue-4 E-ISSN: 2347-2693 Face Recognition Using Robotics Nitesh Pandey 1*,Abhishek Dubey 2 and Bhavesh
More informationPCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING
PCB DETECTION AND CLASSIFICATION USING DIGITAL IMAGEPROCESSING 1 Shashikumar Vishwakarma, 2 SahilTikke, 3 Chinmay Manurkar, 4 Ankit Thanekar 1,2,3,4 Electronics and Telecommunication (B.E), KJSIEIT, (India)
More informationDevelopment of Attendance Management System using Biometrics.
Development of Attendance Management System using Biometrics. O. Shoewu, Ph.D. 1,2* and O.A. Idowu, B.Sc. 1 1 Department of Electronic and Computer Engineering, Lagos State University, Epe Campus, Nigeria.
More informationAutomatic Extraction of Signatures from Bank Cheques and other Documents
Automatic Extraction of Signatures from Bank Cheques and other Documents Vamsi Krishna Madasu *, Mohd. Hafizuddin Mohd. Yusof, M. Hanmandlu ß, Kurt Kubik * *Intelligent Real-Time Imaging and Sensing group,
More informationHSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER
HSI BASED COLOUR IMAGE EQUALIZATION USING ITERATIVE n th ROOT AND n th POWER Gholamreza Anbarjafari icv Group, IMS Lab, Institute of Technology, University of Tartu, Tartu 50411, Estonia sjafari@ut.ee
More informationIntelligent Database Monitoring System using ARM9 with QR Code
Intelligent Database Monitoring System using ARM9 with QR Code Jyoshi Niklesh 1, Dhruva R. Rinku 2 Department of Electronics and Communication CVR College of Engineering, JNTU Hyderabad Hyderabad, India
More informationOpen Access A Facial Expression Recognition Algorithm Based on Local Binary Pattern and Empirical Mode Decomposition
Send Orders for Reprints to reprints@benthamscience.ae The Open Electrical & Electronic Engineering Journal, 2014, 8, 599-604 599 Open Access A Facial Expression Recognition Algorithm Based on Local Binary
More informationFramework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
More informationNormalisation of 3D Face Data
Normalisation of 3D Face Data Chris McCool, George Mamic, Clinton Fookes and Sridha Sridharan Image and Video Research Laboratory Queensland University of Technology, 2 George Street, Brisbane, Australia,
More informationMouse Control using a Web Camera based on Colour Detection
Mouse Control using a Web Camera based on Colour Detection Abhik Banerjee 1, Abhirup Ghosh 2, Koustuvmoni Bharadwaj 3, Hemanta Saikia 4 1, 2, 3, 4 Department of Electronics & Communication Engineering,
More informationA Study of Automatic License Plate Recognition Algorithms and Techniques
A Study of Automatic License Plate Recognition Algorithms and Techniques Nima Asadi Intelligent Embedded Systems Mälardalen University Västerås, Sweden nai10001@student.mdh.se ABSTRACT One of the most
More informationVirtual Mouse Using a Webcam
1. INTRODUCTION Virtual Mouse Using a Webcam Since the computer technology continues to grow up, the importance of human computer interaction is enormously increasing. Nowadays most of the mobile devices
More informationHands free HCI based on head tracking using feature extraction
Hands free HCI based on head tracking using feature extraction Mrs. Nitty Sarah Alex 1 Senior Assistant Professor, New Horizon College of engineering, Bangalore, India Abstract The proposed system is an
More informationPalmprint as a Biometric Identifier
Palmprint as a Biometric Identifier 1 Kasturika B. Ray, 2 Rachita Misra 1 Orissa Engineering College, Nabojyoti Vihar, Bhubaneswar, Orissa, India 2 Dept. Of IT, CV Raman College of Engineering, Bhubaneswar,
More informationHandwritten Signature Verification using Neural Network
Handwritten Signature Verification using Neural Network Ashwini Pansare Assistant Professor in Computer Engineering Department, Mumbai University, India Shalini Bhatia Associate Professor in Computer Engineering
More informationHandwritten Character Recognition from Bank Cheque
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-1 E-ISSN: 2347-2693 Handwritten Character Recognition from Bank Cheque Siddhartha Banerjee*
More informationAudience Analysis System on the Basis of Face Detection, Tracking and Classification Techniques
Audience Analysis System on the Basis of Face Detection, Tracking and Classification Techniques Vladimir Khryashchev, Member, IAENG, Alexander Ganin, Maxim Golubev, and Lev Shmaglit Abstract A system of
More informationJournal of Industrial Engineering Research. Adaptive sequence of Key Pose Detection for Human Action Recognition
IWNEST PUBLISHER Journal of Industrial Engineering Research (ISSN: 2077-4559) Journal home page: http://www.iwnest.com/aace/ Adaptive sequence of Key Pose Detection for Human Action Recognition 1 T. Sindhu
More informationNavigation Aid And Label Reading With Voice Communication For Visually Impaired People
Navigation Aid And Label Reading With Voice Communication For Visually Impaired People A.Manikandan 1, R.Madhuranthi 2 1 M.Kumarasamy College of Engineering, mani85a@gmail.com,karur,india 2 M.Kumarasamy
More informationComputer Vision Based Employee Activities Analysis
Volume 03 Issue 05, September 2014 Computer Vision Based Employee Activities Analysis Md. Zahangir Alom, Nabil Tahmidul Karim, Shovon Paulinus Rozario *, Md. Rezwanul Hoque, Md. Rumman Bin Ashraf, Saikat
More informationMultimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
More informationIntroduction to Pattern Recognition
Introduction to Pattern Recognition Selim Aksoy Department of Computer Engineering Bilkent University saksoy@cs.bilkent.edu.tr CS 551, Spring 2009 CS 551, Spring 2009 c 2009, Selim Aksoy (Bilkent University)
More information3)Skilled Forgery: It is represented by suitable imitation of genuine signature mode.it is also called Well-Versed Forgery[4].
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A New Technique
More informationFRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE
FRACTAL RECOGNITION AND PATTERN CLASSIFIER BASED SPAM FILTERING IN EMAIL SERVICE Ms. S.Revathi 1, Mr. T. Prabahar Godwin James 2 1 Post Graduate Student, Department of Computer Applications, Sri Sairam
More information3D Scanner using Line Laser. 1. Introduction. 2. Theory
. Introduction 3D Scanner using Line Laser Di Lu Electrical, Computer, and Systems Engineering Rensselaer Polytechnic Institute The goal of 3D reconstruction is to recover the 3D properties of a geometric
More informationNeural Network based Vehicle Classification for Intelligent Traffic Control
Neural Network based Vehicle Classification for Intelligent Traffic Control Saeid Fazli 1, Shahram Mohammadi 2, Morteza Rahmani 3 1,2,3 Electrical Engineering Department, Zanjan University, Zanjan, IRAN
More informationSURVEILLANCE ENHANCED FACE RECOGNITION
SURVEILLANCE ENHANCED FACE RECOGNITION BIOMETRICS Face Recognition Biometrics technology has matured rapidly over recent years, and the use of it for security and authentication purposes has become increasingly
More informationOpen-Set Face Recognition-based Visitor Interface System
Open-Set Face Recognition-based Visitor Interface System Hazım K. Ekenel, Lorant Szasz-Toth, and Rainer Stiefelhagen Computer Science Department, Universität Karlsruhe (TH) Am Fasanengarten 5, Karlsruhe
More informationKeywords Input Images, Damage face images, Face recognition system, etc...
Volume 5, Issue 4, 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Research - Face Recognition
More informationThe Scientific Data Mining Process
Chapter 4 The Scientific Data Mining Process When I use a word, Humpty Dumpty said, in rather a scornful tone, it means just what I choose it to mean neither more nor less. Lewis Carroll [87, p. 214] In
More informationA Real Time Driver s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness
A Real Time Driver s Eye Tracking Design Proposal for Detection of Fatigue Drowsiness Nitin Jagtap 1, Ashlesha kolap 1, Mohit Adgokar 1, Dr. R.N Awale 2 PG Scholar, Dept. of Electrical Engg., VJTI, Mumbai
More informationComputer Vision for Quality Control in Latin American Food Industry, A Case Study
Computer Vision for Quality Control in Latin American Food Industry, A Case Study J.M. Aguilera A1, A. Cipriano A1, M. Eraña A2, I. Lillo A1, D. Mery A1, and A. Soto A1 e-mail: [jmaguile,aciprian,dmery,asoto,]@ing.puc.cl
More informationHow To Train A Face Recognition In Python And Opencv
TRAINING DETECTORS AND RECOGNIZERS IN PYTHON AND OPENCV Sept. 9, 2014 ISMAR 2014 Joseph Howse GOALS Build apps that learn from p h o to s & f r o m real-time camera input. D e te c t & recognize the faces
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationAccessing the bank account without card and password in ATM using biometric technology
Accessing the bank account without card and password in ATM using biometric technology Mini Agarwal [1] and Lavesh Agarwal [2] Teerthankar Mahaveer University Email: miniagarwal21@gmail.com [1], lavesh_1071985@yahoo.com
More informationAdvances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany
Advances in Face Recognition Research Second End-User Group Meeting - Feb 21, 2008 Dr. Stefan Gehlen, L-1 Identity Solutions AG, Bochum, Germany L-1 Identity Solutions AG All rights reserved Outline Face
More information2.11 CMC curves showing the performance of sketch to digital face image matching. algorithms on the CUHK database... 40
List of Figures 1.1 Illustrating different stages in a face recognition system i.e. image acquisition, face detection, face normalization, feature extraction, and matching.. 10 1.2 Illustrating the concepts
More informationImage Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
More informationImage Normalization for Illumination Compensation in Facial Images
Image Normalization for Illumination Compensation in Facial Images by Martin D. Levine, Maulin R. Gandhi, Jisnu Bhattacharyya Department of Electrical & Computer Engineering & Center for Intelligent Machines
More informationRecognition of Facial Expression Using AAM and Optimal Neural Networks
International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 Recognition of Facial Expression Using AAM and Optimal Neural Networks J.Suneetha
More information